August 2022

VOlUME 05 ISSUE 08 AUGUST 2022
The Effectiveness of Indonesian National Police Strategy in Cybercrime Eradication through ASEAN Ministerial Meeting on Transnational Crime (AMMTC)
1Elsafani Daniela Kaburuan,2Angel Damayanti
1,2Universitas Kristen Indonesia
DOI : https://doi.org/10.47191/ijsshr/v5-i8-42

Google Scholar Download Pdf
ABSTRACT

Cybercrime has increased along with digital growth in Indonesia in the last decade. There has been a heightened urgency among Indonesian government agencies to eradicate cybercrime. These efforts include a national cybersecurity strategy and taking part in regional cooperation, such as AMMTC. This paper examines the effectiveness of the Indonesian National Police (INP)’s strategy in AMMTC to combat the nation’s cybercrime. By looking at the Global Cybersecurity Index (GCI), this article elaborates on whether the INP’s approach effectively counters cybercrime in Indonesia. This study utilizes transnational crime, cybercrime, cooperative security, and regional organization concepts. It conducts a qualitative research method with a case study approach as a derivative and an analysis descriptive research type. With primary data in the form of interviews with two sources and secondary data that took various related sources, the research conducts triangulation of data. This study shows that although Indonesia was slower in handling cybercrime cases, the effectiveness of INP’s approach on a national and regional scale is starting to look up

KEYWORDS:

Cybercrime, Cybersecurity, Indonesian National Police (INP), ASEAN, AMMTC.

REFERENCES

1) Adrienne, McCarthy L., dan Kevin F. Steinmetz. Critical Criminology and Cybercrime. (2020). In Thomas J. Holt dan Adam M. Bossler, The Palgrave Handbook of International Cybercrime and Cyberdeviance, 601-621. Switzerland: Palgrave Macmillan.

2) Agustini, Pratiwi. Kominfo Tangani Dugaan Kebocoran Data Aplikasi E-Hac. Aptika Kominfo. September 2, 2021. https://aptika.kominfo.go.id/2021/09/kominfo-tangani-dugaan-kebocoran-data-aplikasi-e-hac/

3) Alief, Bisma. Bareskrim Polri Gandeng Twitter Awasi Akun Penyebar SARA dan Menghasut di Pilgub DKI. Detik.com. September 2016. https://news.detik.com/berita/d-3307475/bareskrim-polri-gandeng-twitter-awasi-akun-penyebar-sara- dan-menghasut-di-pilgub-dkiAPJII. Buletin APJII. APJII, 2020: 74.

4) Arianto, Adi Rio, dan Gesti Anggraini. Membangun Pertahanan dan Keamanan Siber Nasional Indonesia Guna Menghadapi Ancaman Siber Global Melalui Indonesia Security Incident Response Team on Internet Infrastructure (ID- SIRTII). Jurnal Pertahanan & Bela Negara 9, no. 1, pp. 13-29. (2019).

5) ASEAN Cyberthreat Assessment 2020: Key Cyberthreat Trends Outlook from the ASEAN Cybercrime Operations Desk (ASEAN Cybercrime Operations Desk, 2020).

6) ASEAN Plan of Action: Combating Transnational Crime (2016-2025) (ASEAN, 20 September 2017).

7) ASEAN Plan of Action to Combat Transnational Crime (ASEAN, 1999).

8) ASEAN Working Group on Cybercrime: Terms of Reference (ASEAN, 2014).

9) Brenner, S. W. Cybercrime Metrics: Old wine in new bottles? Virginia Journal of Law and Technology 9, no. 13, pp. 1- 52. (2004).

10) Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston, MA: Northeastern University Press.

11) BSSN. Sejarah ID-SIRTII. IDSIRTII. (2022). https://idsirtii.or.id/halaman/tentang/sejarah-id-sirtii-cc.html.

12) BSSN. Buletin Informasi SNI Terbaru. Pusat Informasi dan Dokumentasi Standardisasi Badan Standardisasi Nasional, 2016: 4.

13) Caballero-Anthony, Mely. (2005). Regional Security in Southeast Asia: Beyond the ASEAN Way. Singapore: ISEAS Publications

14) Carter, Ashton B., Perry James William, dan John D. Steinbruner. (1993). A New Concept of Co-operative Security. Washington, DC: The Brookings Institution.

15) Clough, J. Data theft? Cybercrime and the increasing criminalization of access to data. Criminal Law Forum 22, no. 1, pp. 145–170. (2011). DOI: 10.1007/s10609-011-9133-5

16) CNBC. Banyak Serangan Siber, Ahli Siber: RI Masuk Tahap Red Alert. CNBC. January 24, 2022. https://www.cnbcindonesia.com/tech/20220124144241-37-309936/banyak-serangan-siber-ahli-siber-ri-masuk-tahap-red- alert

17) Digitalent. Kota Jambi - Pelatihan Basic Cyber Security untuk Sektor Kesehatan. Digitalent. 2022. https://digitalent.kominfo.go.id/detail/pelatihan/2416?akademiId=146

18) Digitalent. Pelatihan Thematic Academy Academy (TA) Offline Tahun 2022 bagi Pencari Kerja Gelombang ke-1. Digitalent. 2022. https://digitalent.kominfo.go.id/detail/pelatihan/1912?akademiId=146 \

19) Direktorat Tindak Pidana Siber Bareskrim Polri. Patroli Siber, 2021. https://cybersecurity.sulutprov.go.id/tentang

20) DPR-RI. Sukamta Minta Pemerintah Benahi Keamanan Siber Nasional. DPR-RI. 23 Januari 2022 https://www.dpr.go.id/berita/detail/id/37154/t/Sukamta+Minta+Pemerintah+Benahi+Keamanan+Siber+Nasional

21) Economic and Social Council Resolution: Organised Transnational Crime (United Nations, December 1994)

22) Emmers, Ralf. (2004). Security Cooperation in the Asia-Pacific: Evolution of Concepts and Practices. In See Seng Tan dan Amitav Acharya, Asia-Pacific Security Cooperation: National Interests and Regional Order. Armonk, New York: M.E. Sharpe.

23) Emmers, Ralf. (2003). Cooperative Security and the Balance of Power in ASEAN and the ARF. London and New York: Routledge Curzon.

24) Fawcett, Louise L'Estrange, dan Andrew Hurell. 1995. Regionalism in World Politics: Regional Organization and International Order. New York: Oxford University Press.

25) IDCERT. Profil Indonesia Computer Emergency Response Team. IDCERT. 2013. https://www.cert.or.id/tentang-kami/id/

26) IDSIRTII. Bimbingan Teknis Pembinaan CSIRT. IDSIRTII. 2021. https://idsirtii.or.id/kegiatan/detail_nama/workshop_and_technical_training/98/bimbingan-teknis-pembinaan-csirt.html

27) IDSIRTII. BSSN Menggelar OIC-CERT Traffic Malware Analysis Technical-Workshop 2021. IDSIRTII. 2021. https://idsirtii.or.id/kegiatan/detail_nama/workshop_and_technical_training/105/bssn-menggelar-oic-cert-traffic-malwae- analysis-technical-workshop-2021.html

28) IDSIRTII. IDSIRTII Menjadi Host APCERT Training dengan Tema Keamanan Jaringan Nirkabel. IDSIRTII. 2021. https://idsirtii.or.id/kegiatan/detail_nama/workshop_and_technical_training/107/idsirtii-menjadi-host-apcert-training- dengan-tema-keamanan-jaringan-nirkabel.html

29) Irviana, Claudia N., dan Roy V. Salomo. Analisis Pengembangan Kapasitas Organisasi di Direktorat Tindak Pidana Siber (DITTIPIDSIBER), Badan Reserse Kriminal POLRI (BARESKRIM POLRI). Media Bina Ilmiah, vol. 15, no. 11, pp. 5687- 5694, 2021.

30) ITU. Global Cybersecurity Index. ITU. (2020). https://www.itu.int/en/ITUD/Cybersecurity/Pages/global-cybersecurity- index.aspx

31) ITU. Global Cybersecurity Index & Cyberwellness Profiles. ITU Publications, 2015: 1.

32) Jayusman, Yus, dan Tarmin Abdulghani. Evaluasi Tata Kelola Teknologi Informasi Dan Perancangan Kebijakan Sistem Manajemen Keamanan Informasi Berdasarkan Kerangka Kerja Cobit 5 Dan Sni Iso/Iec 27001. Bangkit Indonesia, vol. 2, no.7, 2018.

33) Joint Communique of the First ASEAN Plus Three Ministerial Meeting on Transnational Crime (AMMTC+3) (ASEAN, January 10, 2004).

34) Joint Statement of the Ninth ASEAN Ministerial Meeting on Transnational Crime (ASEAN Secretariat, September 17, 2013).

35) Lin, L.S.F., dan John Nomikos. Cybercrime in East and Southeast Asia: The Case of Taiwan. In Masys, A., Lin, L., Asia- Pacific Security Challenges: Advanced Sciences and Technologies for Security Applications (eds) Springer, Cham, 2018.

36) Madsen, F. G. (2009). Transnational organized crime. London, England: Routledge, 2009.

37) Maillart, Jean-Baptiste. The limits of personal territorial jurisdiction in the context of cybercrime. ERA Forum 19, pp: 375– 390, 2019. DOI: 10.1007/s12027-018-0527-2

38) Mantalean, Vitorio. BSSN Sebut Ada 1,6 Miliar Serangan Siber Selama 2021. Kompas. March 7, 2022. https://nasional.kompas.com/read/2022/03/07/20162321/bssn-sebut-ada-16-miliar-serangan-siber-selama-2021

39) Marmita, Sharmaine. The struggle of ASEAN in cyber security. Asia and Africa Today, no. 8, pp. 52-56. 2020. DOI: 10.31857/S032150750010451-8

40) Moodie, M. Cooperative security: Implications for national security and international relations (Cooperative Monitoring Center Occasional Paper No. 14). Livermore, CA: Sandia National Laboratories, 2000.

41) Mulyadi and D. Rahayu, Indonesia National Cybersecurity Review: Before and After Establishment National Cyber and Crypto Agency (BSSN). 2018 6th International Conference on Cyber and IT Service Management (CITSM), pp. 1-6, 2018. DOI: 10.1109/CITSM.2018.8674265.

42) Novitasari, Indah. Babak Baru Rejim Keamanan Siber di Asia Tenggara Menyosong ASEAN Connectivity 2025. Asia Pacific Studies 1, no. 2, pp. 220-233, 2017.

43) Nurhanisah, Yuli. Penerapan dan Penanganan Kasus UU ITE. Indonesia Baik. 2017. https://indonesiabaik.id/infografis/penerapan-dan-penanganan-kasus-uu-ite

44) Nye, Joseph. (1968). International Regionalism: Readings. Boston: Little, Brown.

45) Nye, Joseph. (1971). Peace in Parts. Boston: Little, Brown and Company.

46) Patnistik, Edigius. “Australia Sadap Telepon SBY dan Sejumlah Menteri,” retrieved from https://internasional.kompas.com/read/2013/11/18/0950451/Australia.Sadap.Telepon.SBY.dan.Sejumlah.Menteri.Indone sia, November 18, 2013

47) Payne, Brian K. (2020). Defining Cybercrime. In Thomas J. Holt dan Adam M. Bossler, The Palgrave Handbook of International Cybercrime and Cyberdeviance. Switzerland: Palgrave Macmillan.

48) Peraturan Menteri Pendidikan Nasional Nomor 27 Tahun 2008 Tentang Standar Akademik dan Kompetensi Konselor, Departemen Pendidikan Nasional, 2008.

49) Priambodo, Endo interviewed by Daniela Kaburuan. Dittipidsiber Interview on Membasmi Kejahatan Siber di Indonesia. Indirect interview. Zoom Meeting, Bogor. April 13, 2022.

50) Rizki, Aththaariq, dan Fauzia Gustarina. SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS. Journal of Social Political Sciences 2, no. 4, pp. 342-353, 2021.

51) Sarre, Rick, Laurie Yiu-Chung Lau, and Lennon Y.C. Chang. Responding to cybercrime: current trends. Police Practice and Research 10, no. 6. 515-518, 2018. DOI: 10.1080/15614263.2018.1507888

52) Shantika, Eka. “Situs Telkomsel Dibajak, Telkomsel Minta Maaf,” retrieved from https://www.cnnindonesia.com/teknologi/20170428074646-185-210802/situs-telkomsel-dibajak-telkomsel-minta-maaf, April 28, 2017.

53) SiarNasional. Pusdiklat Badan Siber dan Sandi Negara Bertransformasi Menjadi Pusat Pengembangan SDM. SiarNasional. Februari 2022. https://siarnasional.com/pusdiklat-pengembangan-badan-siber-dan-sandi-negara-bertransformasi-menjadi- pusat-pengembangan-sdm/

54) Sugiarto. Pengembangan Sistem Manajemen Keamanan Informasi Berbasis SNI ISO/IEC 27001:2013: Studi Kasus Data Center Divisi Teknologi Informasi dan Komunikasi Polri = Development of Information Security Management System based on SNI ISO/IEC 27001:2013: A Case Study. Skripsi, Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2019.

55) Sumarno, Wino, interviewed by Elsafani Daniela Kaburuan. POLRI Interview on ASEAN Ministerial Meeting in Transnational Crime (AMMTC). Indirect interview. Zoom Meeting, Bogor. April 11, 2022.

56) SumutPos.co. Polisi Kantongi Hacker Situs POLRI. SumutPos.co. May 2011. https://sumutpos.jawapos.com/nasional/23/05/2011/polisi-kantongi-hacker-situs-polri/

57) Tribun Jakarta. Pelatihan Intensif dan Sertifikasi bidang Cybersecurity untuk Generasi Muda Indonesia. Tribun Jakarta. 2022. https://jakarta.tribunnews.com/2022/03/29/pelatihan-intensif-dan-sertifikasi-bidang-cybersecurity-untuk-generasi- muda-indonesia

58) United Nations Convention against Transnational Organized Crime (UNODC, November 15, 2000)

59) Wall, D. S. (2001). Cybercrimes and the internet. In D. S. Wall, Crime and the Internet. New York: Routledge.

60) Wall, D. S. (2007). Cybercrime. Cambridge, UK: Polity Press.

61) Wiener, Norbert. (1948). Cybernetics: Or control and communication in the animal and the machine. New York: Wile.

62) Yasmin, Muhammad. Perancangan Tata Kelola Keamanan Informasi Menggunakan Framework Cobit 2019 Dan Iso/Iec 27001:2013 (Studi Kasus Ditreskrimsus Polda Xyz). Thesis, STEI Teknik Elektro, 2021.

VOlUME 05 ISSUE 08 AUGUST 2022

Indexed In

Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar